ABSTRACT
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular technique consists in "poisoning" a specific item (movie, song, or software title) by injecting a massive number of decoys into the peer-to-peer network, to reduce the availability of the targeted item. In addition to poisoning, pollution, that is, the accidental injection of unusable copies of files in the network, also decreases content availability. In this paper, we attempt to provide a first step toward understanding the differences between pollution and poisoning, and their respective impact on content availability in peer-to-peer file sharing networks. To that effect, we conduct a measurement study of content availability in the four most popular peer-to-peer file sharing networks, in the absence of poisoning, and then simulate different poisoning strategies on the measured data to evaluate their potential impact. We exhibit a strong correlation between content availability and topological properties of the underlying peer-to-peer network, and show that the injection of a small number of decoys can seriously impact the users' perception of content availability.
- A&M Records et al. v. Napster. U.S. Ct. of Appeals for the 9th Circuit, Case Nr.: 00-16401. Feb. 12, 2001.Google Scholar
- giFT: Internet File Transfer - FastTrack plug-in. BiBTeXhttp://gift-fasttrack.berlios.de/.Google Scholar
- Jugle real-time fake check for eMule and eDonkey. BiBTeXhttp://www.jugle.net.Google Scholar
- MLDonkey, a multi-networks file-sharing client. BiBTeXhttp://savannah.nongnu.org/projects/mldonkey/.Google Scholar
- R. Bhagwan, S. Savage, and G. Voelker. Understanding availability. Proc. IPTPS'03, pp. 256--267, Berkeley, CA, Feb. 2003.Google ScholarCross Ref
- J. Chu, K. Labonte, and B. Levine. Availability and locality measurements of peer-to-peer filesystems. Proc. SPIE, vol. 4868, pp. 310--321, Boston, MA, July 2002.Google Scholar
- B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman. PlanetLab: an overlay testbed for broad-coverage services. ACM Comp. Comm. Rev., 33(3):3--12, July 2003. Google ScholarDigital Library
- D. Clark, J. Wroclawski, K. Sollins, and R. Braden. Tussle in cyberspace: defining tomorrow's Internet. Proc. ACM SIGCOMM'02, pp. 347--356, Pittsburgh, PA, Aug. 2002. Google ScholarDigital Library
- B. Cohen. Incentives build robustness in BitTorrent. Proc. 1st Work. Econ. Peer-to-Peer Syst., Berkeley, CA, June 2003.Google Scholar
- D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel. Denial-of-service resilience in peer-to-peer file sharing systems. Proc. ACM SIGMETRICS'05, Banff, AB, Canada, June 2005. To appear. Google ScholarDigital Library
- N. Good and A. Krekelberg. Usability and privacy: a study of KaZaA P2P file-sharing. Proc. ACM CHI'03, pp. 137--144, Fort Lauderdale, FL, Apr. 2003. Google ScholarDigital Library
- K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. Proc. ACM SOSP'03, pp. 314--329, Bolton Landing, NY, Oct. 2003. Google ScholarDigital Library
- J. Hale and G. Manes. Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network, May 2004. U.S. Patent nr. 6,732,180.Google Scholar
- T. Karagiannis, A. Broido, N. Brownlee, kc claffy, and M. Faloutsos. Is P2P dying or just hiding? Proc. IEEE Globecom'04, Dallas, TX, Nov. 2004.Google ScholarCross Ref
- F. Le Fessant, S. Handurukande, A.-M. Kermarrec, and L. Massoulié. Clustering in peer-to-peer filesharing workloads. Proc. IPTPS'04, pp. 217--226, San Diego, CA, Feb. 2004. Google ScholarDigital Library
- J. Liang, R. Kumar, and K. Ross. The KaZaA overlay: a measurement study. Working paper, Sept. 2004.Google Scholar
- J. Liang, R. Kumar, Y. Xi, and K. Ross. Pollution in P2P file sharing systems. Proc. IEEE INFOCOM'05, Miami, FL, Mar. 2005. To appear.Google ScholarCross Ref
- B.-T. Loo, R. Huebsch, I. Stoica, and J. Hellerstein. The case for a hybrid P2P search infrastructure. Proc. IPTPS'04, pp. 141--150, San Diego, CA, Feb. 2004. Google ScholarDigital Library
- P. Maymounkov and D. Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. Proc. IPTPS'02, pp. 53--65, Cambridge, MA, Feb. 2002. Google ScholarDigital Library
- F. Oberholzer and K. Strump. The effect of file sharing on record sales: an empirical analysis. Working Paper, Mar. 2004.Google Scholar
- S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, and H. Levy. An analysis of Internet content delivery systems. Proc. USENIX OSDI'02, pp. 156--170, Boston, MA, Dec. 2002. Google ScholarDigital Library
- S. Saroiu, K. Gummadi, and S. Gribble. A measurement study of peer-to-peer file sharing systems. Proc. SPIE/ACM MMCN'02, pp. 156--170, San Jose, CA, Jan. 2002.Google Scholar
- S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. Proc. ACM IMW'02, pp. 137--150, Marseille, France, Nov. 2002. Google ScholarDigital Library
- K. Tutschku. A measurement-based traffic profile of the eDonkey filesharing service. Proc. PAM'04, pp. 12--21, Juan-les-Pins, France, Apr. 2004.Google ScholarCross Ref
- A. Zentner. Measuring the effect of music downloads on music sales. Working Paper. June 2003.Google Scholar
Index Terms
- Content availability, pollution and poisoning in file sharing peer-to-peer networks
Recommendations
Cost-effective broadcast for fully decentralized peer-to-peer networks
Fully unstructured and decentralized peer-to-peer networks such as Gnutella are appealing for a variety of applications, among which file-sharing is the most prominent one. The decentralized nature of these systems provides a high degree of robustness ...
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09: Proceedings of the 28th IEEE conference on Global telecommunicationsPeer-to-peer (P2P) networks are vulnerable from malicious attacks by anonymous users. By populating unprotected peers with poisoned file indices, the attacker can launch a poisoning DDoS (distributed denial-of-service) attacks on any host in the ...
A peer-to-peer file search and download protocol for wireless ad-hoc networks
Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only ...
Comments